[Pdns-announce] Security Advisory 2022-02 for PowerDNS Recursor up to and including 4.5.9, 4.6.2, 4.7.1
Otto Moerbeek
otto.moerbeek at open-xchange.com
Tue Aug 23 10:27:44 UTC 2022
Hello,
Today we have released PowerDNS Recursor 4.5.10, 4.6.3 and 4.7.2 due to
a medium severity issue found. The security advisory only applies to
Recursors running with protobuf logging enabled.
Please find the full text of the advisory below.
The changelogs are available at [1]4.5.10, [2]4.6.3, [3]4.7.2.
The source tarballs ([4]4.5.10, [5]4.6.3, [6]4.7.2) and signatures
([7]4.5.10, [8]4.6.3, [9]4.7.2) are available from our download
[10]server. Patches are available at [11]patches. Packages for various
distributions are available from our [12]repository.
Note that PowerDNS Recursor 4.4.x and older releases are End of Life.
Consult the [13]EOL policy for more details.
__________________________________________________________________
PowerDNS Security Advisory 2022-02: incomplete exception handling
related to protobuf message generation
CVE: CVE-2022-37428
Date: 23th of August 2022.
Affects: PowerDNS Recursor up to and including 4.5.9, 4.6.2 and 4.7.1
Not affected: PowerDNS Recursor 4.5.10, 4.6.3 and 4.7.2
Severity: Medium
Impact: Denial of service
Exploit: This problem can be triggered by a remote attacker with
access to the recursor if protobuf logging is enabled
Risk of system compromise: None
Solution: Upgrade to patched version, disable protobuf logging of responses
This issue only affects recursors which have protobuf logging enabled
using the
* protobufServer function with logResponses=true or
* outgoingProtobufServer function with logResponses=true
If either of these functions is used without specifying logResponses,
its value is true.
An attacker needs to have access to the recursor, i.e. the remote IP
must be in the access control list.
If an attacker queries a name that leads to an answer with specific
properties, a protobuf message might be generated that causes an
exception. The code does not handle this exception correctly, causing a
denial of service.
References
1. https://docs.powerdns.com/recursor/changelog/4.5.html#change-4.5.10
2. https://docs.powerdns.com/recursor/changelog/4.6.html#change-4.6.3
3. https://docs.powerdns.com/recursor/changelog/4.7.html#change-4.7.2
4. https://downloads.powerdns.com/releases/pdns-recursor-4.5.10.tar.bz2
5. https://downloads.powerdns.com/releases/pdns-recursor-4.6.3.tar.bz2
6. https://downloads.powerdns.com/releases/pdns-recursor-4.7.2.tar.bz2
7. https://downloads.powerdns.com/releases/pdns-recursor-4.5.10.tar.bz2.sig
8. https://downloads.powerdns.com/releases/pdns-recursor-4.6.3.tar.bz2.sig
9. https://downloads.powerdns.com/releases/pdns-recursor-4.7.2.tar.bz2.sig
10. https://downloads.powerdns.com/releases/
11. https://downloads.powerdns.com/patches/2022-02/
12. https://repo.powerdns.com/
13. https://docs.powerdns.com/recursor/appendices/EOL.html
--
kind regards,
Otto Moerbeek
PowerDNS Developer
Email: otto.moerbeek at open-xchange.com
-------------------------------------------------------------------------------------
Open-Xchange AG, Hohenzollernring 72, 50672 Cologne, District Court Cologne HRB 95366
Managing Board: Andreas Gauger, Dirk Valbert, Frank Hoberg, Stephan Martin
Chairman of the Board: Richard Seibt
PowerDNS.COM BV, Koninginnegracht 14L, 2514 AA Den Haag, The Netherlands
Managing Director: Robert Brandt, Maxim Letski
-------------------------------------------------------------------------------------
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 475 bytes
Desc: not available
URL: <http://mailman.powerdns.com/pipermail/pdns-announce/attachments/20220823/973cd9cb/attachment.sig>
More information about the Pdns-announce
mailing list